Atjaunināt sīkdatņu piekrišanu

E-grāmata: Handbook of Image-based Security Techniques

(Department of Computer Science and Engineering, MNNIT, India), (Global Biomedical Technologies, Inc., CA, USA), (Department of Computer Science and Engineering, Thapar University, India)
  • Formāts: 442 pages
  • Izdošanas datums: 20-May-2018
  • Izdevniecība: CRC Press
  • Valoda: eng
  • ISBN-13: 9781351681551
  • Formāts - EPUB+DRM
  • Cena: 61,35 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: 442 pages
  • Izdošanas datums: 20-May-2018
  • Izdevniecība: CRC Press
  • Valoda: eng
  • ISBN-13: 9781351681551

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book focuses on image based security techniques, namely visual cryptography, watermarking, and steganography. This book is divided into four sections. The first section explores basic to advanced concepts of visual cryptography.

The second section of the book covers digital image watermarking including watermarking algorithms, frameworks for modeling watermarking systems, and the evaluation of watermarking techniques. The next section analyzes steganography and steganalysis, including the notion, terminology and building blocks of steganographic communication.

The final section of the book describes the concept of hybrid approaches which includes all image-based security techniques. One can also explore various advanced research domains related to the multimedia security field in the final section. The book includes many examples and applications, as well as implementation using MATLAB, wherever required.

Features:











Provides a comprehensive introduction to visual cryptography, digital watermarking and steganography in one book Includes real-life examples and applications throughout Covers theoretical and practical concepts related to security of other multimedia objects using image based security techniques Presents the implementation of all important concepts in MATLAB
Foreword xxiii
Preface xxv
Authors xxix
Section I Visual Cryptography
Chapter 1 Visual Cryptography: Introduction
3(24)
1.1 Introduction
4(1)
1.2 Visual Cryptography
5(2)
1.3 Applications Of Visual Cryptography
7(4)
1.3.1 Trojan-Free Secure Transaction
7(3)
1.3.2 Authentication
10(1)
1.3.3 Access Control
11(1)
1.3.4 Transaction Tracking
11(1)
1.3.5 Watermarking
11(1)
1.4 Preliminaries
11(2)
1.5 Fundamental Principles Of Visual Secret Sharing
13(3)
1.5.1 Pixels Expansion m
13(1)
1.5.2 Contrast α
14(1)
1.5.3 Basis Matrices
15(1)
1.5.4 Concept Of Black And White Pixels In Visual Cryptography
16(1)
1.6 Formation Of A Basis Matrix
16(3)
1.6.1 Observations Related To The Basis Matrix Creation Approach Of Naor And Shamir
17(1)
1.6.2 Essential Conditions For A Basis Matrix
18(1)
1.7 Different Evaluation Parameters
19(8)
1.7.1 Objective Evaluation Parameters
19(4)
1.7.2 Subjective Parameters
23(4)
Chapter 2 Various Dimensions Of Visual Cryptography
27(38)
2.1 Various Dimensions Of Visual Cryptography
28(37)
2.1.1 Traditional Visual Cryptography (TVC)
29(3)
2.1.1.1 Threshold Visual Cryptography
30(2)
2.1.2 Extended Visual Cryptography (EVC)
32(15)
2.1.2.1 Halftone Visual Cryptography (HVC)
32(1)
2.1.2.2 Significance Of A Halftone Image Over A Binary Image
33(1)
2.1.2.3 Halftone Image Creation Using Error Diffusion
33(4)
2.1.2.4 Tagged Visual Cryptography (TVC)
37(2)
2.1.2.5 Friendly Visual Cryptography (FVC)
39(1)
2.1.2.6 Size Invariant Visual Cryptography
39(3)
2.1.2.7 Progressive Visual Cryptography (PVC)
42(1)
2.1.2.8 Progressive Visual Cryptography With Meaningful Shares Without Pixel Expansion
43(4)
2.1.3 Dynamic Visual Cryptography (DVC)
47(21)
2.1.3.1 Multitone/Continuous Tone Visual Cryptography (MVC)
47(2)
2.1.3.2 MVC With Unexpanded Meaningful Shares
49(1)
2.1.3.3 Perfect Recovery Of The Secret Image In MVC
50(1)
2.1.3.4 Visual Cryptography With Multiple Secrets Or Multi Secret Sharing (MSS)
51(1)
2.1.3.5 Angle Restriction Problem In Mss
51(3)
2.1.3.6 Multi Secret Sharing With Unexpanded Meaningful Shares
54(1)
2.1.3.7 XOR-Based Visual Cryptography
54(2)
2.1.3.8 Hybrid Approach With XOR-Based VC, Multitone VC, FVC, Size Invariant VC And Multi Secret Sharing
56(1)
2.1.3.9 Verifiable Visual Cryptography (VVC)
57(3)
2.1.3.10 Hybrid Approach With VVC
60(1)
2.1.3.11 Random Grid-Based Visual Cryptography (RGVC)
60(1)
2.1.3.12 Hybrid Approaches Using RGVC
61(4)
Chapter 3 VC Approaches With Computationless Recovery Of Secrets
65(42)
3.1 Computation Less And Computation-Based Visual Cryptography Approaches
66(2)
3.2 Basics For The Development Of Computation- Less VC Approaches
68(39)
3.2.1 Development Of Threshold Visual Cryptography
68(6)
3.2.2 Development Of A Halftone Visual Cryptography (HVC) Scheme
74(3)
3.2.3 Development Of A Friendly Visual Cryptography (FVC) Scheme
77(3)
3.2.4 Development Of Size Invariant Visual Cryptography
80(6)
3.2.4.1 Preprocessing Of Secret Image For Size Invariant Visual Cryptography
80(4)
3.2.4.2 Size Invariant Share Generation With The Help Of The Preprocessed Secret
84(2)
3.2.5 Development Of A Hybrid Approach Using Friendly Visual Cryptography (FVC) And Size Invariant Visual Cryptography
86(5)
3.2.5.1 Steps For Making A Hybrid Approach
86(5)
3.2.6 Development Of Random Grid-Based Visual Cryptography
91(4)
3.2.6.1 Steps To Generate Shares Using A Random Grid
93(2)
3.2.7 Development Of Visual Cryptography With Multiple Secrets
95(5)
3.2.7.1 Steps To Generate Shares For Multiple Secrets
95(5)
3.2.8 Development Of Progressive Visual Cryptography (PVC)
100(7)
Chapter 4 VC Approaches With Computation-Based Recovery Of Secrets
107(38)
4.1 Computationless And Computation-Based Visual Cryptography Approaches
109(2)
4.1.1 Computation-Based VC vs. Share Alignment Problem
109(2)
4.2 Basics For The Development Of Computation- Based VC Approaches
111(34)
4.2.1 Development Of XOR-Based Visual Cryptography
112(1)
4.2.2 Basis Matrix Creation For The XOR-Based VC Approach
112(4)
4.2.3 XOR-Based VC With Unexpanded Meaningful Shares
116(1)
4.2.3.1 Steps To Develop XOR-Based VC With Unexpanded Meaningful Shares
116(1)
4.2.4 Development Of Multitone Visual Cryptography
117(6)
4.2.4.1 Steps To Develop Multitone Visual Cryptography With Random Shares
119(3)
4.2.4.2 Steps To Generate Meaningful Shares For A Multitone Secret
122(1)
4.2.5 Development Of XOR-Based Multi Secret Sharing Approach For Multitone Secrets
123(6)
4.2.5.1 Steps To Develop XOR-Based Multi Secret Sharing Approach For Multitone Secrets With Random Shares
123(6)
4.2.6 XOR-Based MSS With Unexpanded Meaningful Shares
129(1)
4.2.7 Development Of Verifiable Visual Cryptography
129(18)
4.2.7.1 Providing Verifiability Into The Shares Generated By Computationless VC Approaches
130(1)
4.2.7.2 Steps For Adding Verifiability Into The Shares Generated By Computationless VC Approaches
130(4)
4.2.7.3 Adding Verifiability Into The Shares Generated By Computation-Based VC Approaches
134(2)
4.2.7.4 Steps For Providing Verifiability In The Shares Generated By Computation-Based VC Approaches
136(9)
Section II Digital Image Watermarking
Chapter 5 Digital Image Watermarking: Introduction
145(32)
5.1 Introduction
147(3)
5.1.1 Significance Of The Word "Watermark"
149(1)
5.1.2 Importance Of Watermarking
149(1)
5.2 Watermarking Applications
150(5)
5.2.1 Proof Of Ownership
150(1)
5.2.2 Ownership Identification
150(1)
5.2.3 Broadcast Monitoring
150(1)
5.2.4 Content Authentication
151(1)
5.2.5 Tamper Recovery
152(1)
5.2.6 Transaction Tracking
152(3)
5.2.7 Copy Control
155(1)
5.2.8 Device Control
155(1)
5.3 Classification Of Watermarking Techniques
155(6)
5.3.1 Based On Visibility
156(1)
5.3.1.1 Visible Watermarking
156(1)
5.3.1.2 Invisible/Hidden Watermarking
157(1)
5.3.2 Based On Degree Of Resistance To Attacks
157(2)
5.3.2.1 Robust Watermark
157(1)
5.3.2.2 Fragile Watermark
158(1)
5.3.2.3 Semi-Fragile Watermark
158(1)
5.3.2.4 Dual Watermarking
159(1)
5.3.3 Based On Watermark Embedding
159(1)
5.3.3.1 Block-Based Watermarking
159(1)
5.3.3.2 Pixel-Based Watermarking
160(1)
5.3.4 Based On Watermark Detection/Extraction
160(1)
5.3.4.1 Non-Blind/Non-Oblivious Watermarking
160(1)
5.3.4.2 Semi-Blind Watermarking
161(1)
5.3.4.3 Blind/Oblivious Watermarking
161(1)
5.4 Properties Of Watermarks
161(3)
5.4.1 Robustness
161(2)
5.4.2 Fragility
163(1)
5.4.3 Imperceptibility
163(1)
5.4.4 Capacity
163(1)
5.4.5 Security
164(1)
5.4.6 Computational Cost
164(1)
5.5 Attacks
164(3)
5.5.1 Types Of Attacks
164(2)
5.5.1.1 Intentional Attack
164(1)
5.5.1.2 Unintentional Attack
165(1)
5.5.2 Example Of Attacks In The Watermarking System
166(1)
5.5.2.1 Removal Attack
166(1)
5.5.2.2 Addition Attack
166(1)
5.5.2.3 Cryptographic Attacks
166(1)
5.5.2.4 Copy Paste Attack
166(1)
5.5.2.5 Print Scan Attack
166(1)
5.5.2.6 Geometric Attack
167(1)
5.6 Watermarking Domain
167(1)
5.6.1 Spatial Domain
167(1)
5.6.2 Frequency Domain
168(1)
5.7 Measures Of Evaluation
168(5)
5.7.1 Subjective Measures
169(1)
5.7.2 Objective Measures
170(3)
5.7.3 Other Evaluation Parameters
173(1)
5.7.3.1 False Acceptance Rate (FAR)
173(1)
5.7.3.2 False Rejection Rate (FRR)
173(1)
5.8 Watermarking Scheme With Recovery Capabilities
173(4)
5.8.1 Recovery Using Spatial Domain
173(1)
5.8.2 Recovery Using Frequency Domain
174(3)
Chapter 6 Fragile Watermarking
177(42)
6.1 Introduction
179(4)
6.1.1 Fragile Watermark As A Hash Function For Images
179(1)
6.1.2 Fragility Of A Fragile Watermark
179(1)
6.1.3 Types Of Fragile Watermark
180(3)
6.1.3.1 On The Basis Of The Embedding Mechanism
181(1)
6.1.3.2 On The Basis Of The Extraction Mechanism
182(1)
6.2 Generation Of A Fragile Watermark
183(13)
6.2.1 Image-Based Fragile Watermark
183(4)
6.2.1.1 Relation Between Cover Image And Image-Based Watermark
184(3)
6.2.2 Self-Embedding Techniques
187(2)
6.2.2.1 Relation Between Cover Image And Self-Embedding Watermark
188(1)
6.2.3 Example Of Self-Embedding Techniques
189(4)
6.2.4 Significance Of The XOR Operation In Self-Embedding
193(1)
6.2.5 Fragile Watermark With Symmetric Key
194(1)
6.2.6 Watermark Generation For Color Images
195(1)
6.3 Embedding Of A Fragile Watermark
196(13)
6.3.1 Domain Selection
196(1)
6.3.1.1 Spatial Domain
196(1)
6.3.1.2 Frequency Domain
197(1)
6.3.1.3 Which Domain Is Suitable For A Fragile Watermark?
197(1)
6.3.2 Bit Plane Slicing
197(7)
6.3.2.1 Which Bit Should Be Chosen For Embedding?
200(1)
6.3.2.2 How Many Bits Should Be Chosen For Embedding?
201(3)
6.3.3 Imperceptibility vs. Tamper Detection
204(5)
6.3.3.1 Block-Based Embedding
204(1)
6.3.3.2 Pixel-Based Embedding
205(2)
6.3.3.3 Region-Of-Interest (ROI)-Based Embedding
207(2)
6.4 Extraction Of A Fragile Watermark
209(10)
6.4.1 Unintentional Tampering
209(1)
6.4.2 Intentional Tampering
210(1)
6.4.3 Semi-Fragile Watermarks
211(1)
6.4.4 Tamper Localization
212(2)
6.4.4.1 Tamper Localization For Non-Blind Fragile Watermark
213(1)
6.4.4.2 Tamper Localization For Semi-Blind Fragile Watermark
213(1)
6.4.4.3 Tamper Localization For Blind Fragile Watermark
213(1)
6.4.4.4 Pixel Wise Tamper Detection
213(1)
6.4.4.5 Block Wise Tamper Detection
214(1)
6.4.5 Tamper Detection Parameters
214(5)
Chapter 7 Fragile Watermark With Recovery Capabilities In Spatial Domain
219(30)
7.1 Introduction
221(7)
7.1.1 Fragile Watermark With Recovery Capabilities
221(1)
7.1.2 Summary Bit Stream: Recovery Information
221(1)
7.1.3 Summary And Authentication Bit Streams
222(1)
7.1.4 Fragility Of Fragile Watermark
222(1)
7.1.5 Types Of Fragile Watermark With Recovery Capabilities
223(4)
7.1.5.1 On The Basis Of The Embedding Mechanism
223(3)
7.1.5.2 On The Basis Of The Extraction Mechanism
226(1)
7.1.6 Ideal Category For Fragile Watermark With Recovery Capabilities
227(1)
7.2 Generation Of A Fragile Watermark
228(9)
7.2.1 Self-Embedding Techniques
228(9)
7.2.1.1 Self-Embedding With Block-Based Authentication And Block-Based Recovery
229(5)
7.2.1.2 Self-Embedding With Pixel-Based Authentication And Block-Based Recovery
234(1)
7.2.1.3 Self-Embedding With Pixel-Based Authentication And Pixel-Based Recovery
234(3)
7.3 Embedding Of Fragile Watermark
237(3)
7.3.1 Embedding And Originating Blocks Are Same:
237(1)
7.3.2 Originating Blocks Are Embedded Into Sequentially Mapped Embedding Blocks
237(2)
7.3.3 Originating Blocks Are Embedded Into Randomly Mapped Embedding Blocks
239(1)
7.4 Extraction Of A Fragile Watermark
240(9)
7.4.1 Tamper Localization And Recovery
241(6)
7.4.1.1 Non-Blind Authentication And Non-Blind Recovery
241(1)
7.4.1.2 Semi-Blind Authentication And Semi-Blind Recovery
241(1)
7.4.1.3 Blind Authentication And Semi-Blind Recovery
241(1)
7.4.1.4 Blind Authentication And Blind Recovery
242(1)
7.4.1.5 Block-Based Tamper Detection And Recovery
242(1)
7.4.1.6 Pixel-Based Tamper Detection And Block-Based Recovery
242(2)
7.4.1.7 Pixel-Based Tamper Detection And Pixel-Based Recovery
244(3)
7.4.2 Non-Zero Far Due To Improper Mapping
247(2)
Chapter 8 Fragile Watermark With Recovery Capabilities In Frequency Domain
249(20)
8.1 Introduction
250(3)
8.1.1 Summary Bit Stream: Recovery Information Through Frequency Coefficient
251(1)
8.1.2 Types Of Fragile Watermark With Recovery Capabilities In Frequency Domain
251(2)
8.1.2.1 On The Basis Of The Embedding Mechanism
252(1)
8.1.2.2 On The Basis Of The Extraction Mechanism
253(1)
8.2 Generation Of A Fragile Watermark
253(10)
8.2.1 Self-Embedding Techniques
254(9)
8.2.1.1 Block-Based Self-Embedding Approach
254(2)
8.2.1.2 Example Of Block-Based Summary Bit Generation
256(4)
8.2.1.3 Non-Block-Based Self-Embedding Approach
260(1)
8.2.1.4 Example Of Summary Bit Generation For Non-Block-Based Recovery
260(3)
8.3 Embedding Of A Fragile Watermark
263(2)
8.3.1 Embedding Of Summary Bits In Spatial Domain
263(1)
8.3.2 Embedding Of Summary Bits In Frequency Domain
264(1)
8.4 Extraction Of A Fragile Watermark
265(4)
8.4.1 Tamper Localization And Recovery
266(3)
Chapter 9 Robust Watermarking
269(24)
9.1 Introduction
271(6)
9.1.1 Robust Watermark For Ownership Assertion
271(1)
9.1.2 Robustness Of Robust Watermark
272(1)
9.1.3 Image As Watermark
272(1)
9.1.4 Relationship Between The Dimensions Of Cover And Watermarked Images
273(1)
9.1.5 Image Types For Watermark
274(1)
9.1.6 Single vs. Multiple Robust Watermarks
274(1)
9.1.7 Encrypted Robust Watermark
275(1)
9.1.8 Types Of Robust Watermark On The Basis Of Extraction Mechanism
275(2)
9.1.8.1 Non-Blind Robust Watermark
275(1)
9.1.8.2 Semi-Blind Robust Watermark
276(1)
9.1.8.3 Blind Robust Watermark
276(1)
9.2 Generation Of Robust Watermark
277(1)
9.2.1 Binary Vector Generation For Binary Images
277(1)
9.2.2 Binary Vector Generation For Gray/Color Images
278(1)
9.2.3 Encryption Of The Binary Vector Of Watermark
278(1)
9.3 Embedding Of Robust Watermarks
278(5)
9.3.1 Domain Selection For Embedding
278(1)
9.3.2 Embedding Of Robust Watermark In Frequency Domain
279(4)
9.3.2.1 DCT-Based Embedding For Robust Watermarks
280(3)
9.4 Extraction Of Robust Watermarks
283(10)
9.4.1 Effect Of Unintentional Tampering On A Watermark
285(1)
9.4.2 Effect Of Intentional Tampering On A Watermark
285(1)
9.4.3 Extraction Of Multiple Watermarks
285(3)
9.4.4 Extraction-Based Categorization Of Robust Watermarking
288(2)
9.4.4.1 Ownership Assertion For Non-Blind Robust Watermarks
288(1)
9.4.4.2 Ownership Assertion For Semi-Blind Robust Watermark
288(2)
9.4.4.3 Ownership Assertion For Blind Robust Watermark
290(1)
9.4.5 Decryption Of The Encrypted Watermark Bit Vector
290(1)
9.4.6 Watermark Comparison Parameters
290(4)
9.4.6.1 Objective Evaluation Parameters
290(1)
9.4.6.2 Subjective Evaluation Parameters
291(2)
Chapter 10 Dual Watermarking
293(30)
10.1 Introduction
294(8)
10.1.1 Need For Dual Watermark
295(1)
10.1.2 Managing Robustness And Fragility At The Same Time
295(1)
10.1.3 Image For Robust Watermark And Self-Embedding For Fragile Watermark
296(1)
10.1.4 Achievable Security Requirements Through Dual Watermarking
297(1)
10.1.5 Semi-Fragile Watermarks vs. Dual Watermarks
297(1)
10.1.6 Types Of Dual Watermarks
298(4)
10.1.6.1 On The Basis Of The Embedding Mechanism
298(3)
10.1.6.2 On The Basis Of The Extraction Mechanism
301(1)
10.2 Generation And Embedding Of Dual Watermarks
302(8)
10.2.1 Hierarchical Approach For Watermark Generation And Embedding
302(5)
10.2.1.1 Embedding Of The Watermark (Selected As Copyright) In The Frequency Domain
303(1)
10.2.1.2 Fragile Watermark Generation Using A Self-Embedding Approach From The Copy-Right Embedded Image
304(2)
10.2.1.3 Fragile Watermark Vector Fb Embedding In The Spatial Domain Of The Copyright Embedded Image IRW
306(1)
10.2.2 Validity Of The Proposed Dual Watermark Embedding Sequence
307(3)
10.3 Extraction Of Dual Watermarks
310(13)
10.3.0.1 Authentication And Authorization For Non-Blind Dual Watermark
314(1)
10.3.0.2 Authentication And Authorization For Semi-Blind Dual Watermarks
314(1)
10.3.0.3 Authentication And Authorization For Blind Dual Watermark
315(1)
10.3.0.4 Block Wise Tamper Detection
315(1)
10.3.0.5 Pixel Wise Tamper Detection
315(1)
10.3.1 Tamper Recovery In Dual Watermarking
315(4)
10.3.2 Tamper Detection And Watermark Comparison Parameters
319(4)
Section III Steganography
Chapter 11 Steganography
323(16)
11.1 Introduction
324(3)
11.1.1 Watermarking vs. Steganography
325(1)
11.1.2 Need For Steganography
326(1)
11.2 Applications Of Steganography
327(1)
11.2.1 Positive Applications
327(1)
11.2.2 Negative Applications
328(1)
11.3 Properties Of Steganography
328(3)
11.3.1 Fidelity
328(1)
11.3.2 Embedding Capacity
328(2)
11.3.3 Embedding Effectiveness
330(1)
11.3.4 Blind Extraction
330(1)
11.3.5 Statistical Undetectability
330(1)
11.3.6 Robustness
330(1)
11.3.7 Security
331(1)
11.3.8 Computation Cost
331(1)
11.4 Performance Measures For Steganography Approaches
331(2)
11.4.1 Embedding Capacity
332(1)
11.4.2 Imperceptibility
333(1)
11.4.3 False Positive And False Negative
333(1)
11.4.4 Computation Cost
333(1)
11.5 Mathematical Notation And Terminology
333(1)
11.6 Steganalysis
334(2)
11.6.1 Passive Steganalysis
334(1)
11.6.2 Active Steganalysis
334(1)
11.6.3 Malicious Steganalysis
335(1)
11.7 Detection
336(3)
11.7.1 Blind Steganalysis
336(1)
11.7.2 Targeted Steganalysis
336(3)
Chapter 12 Development Of Steganography And Steganalysis
339(24)
12.1 Practical Approach Towards Steganography
340(1)
12.2 Embedding Of A Secret Message
341(12)
12.2.1 Preprocessing A Secret Message
341(7)
12.2.1.1 Lossless Compression Of Secret Message
342(5)
12.2.1.2 Text To ASCII Code Generation
347(1)
12.2.1.3 ASCII Code To Binary Bit Conversion
347(1)
12.2.2 Domain Selection
348(1)
12.2.2.1 Spatial Domain
348(1)
12.2.2.2 Frequency Domain
348(1)
12.2.3 Secret Bits Embedding
349(4)
12.2.3.1 Embedding In The Spatial Domain
349(3)
12.2.3.2 Embedding In The Frequency Domain
352(1)
12.3 Extraction Of Secret Messages
353(3)
12.3.1 Secret Bits Extraction
353(2)
12.3.2 Postprocessing Of Secret Bits
355(1)
12.3.3 Conversion From Bits To Readable Format
356(1)
12.4 Practical Approach Towards Steganalysis
356(7)
12.4.1 Cachin's Definition Of Steganography
356(1)
12.4.2 LSB-Based Steganalysis
357(6)
Section IV Hybrid Approaches And Advanced Research Topics
Chapter 13 Image-Based Security Using VC, Watermarking & Steganography
363(24)
13.1 Introduction
364(2)
13.2 Hybrid Approach Using Steganography And Watermarking
366(8)
13.2.1 Combination Of Robust Watermarking And Steganography Approach
366(4)
13.2.1.1 Steps To Make A Hybrid Approach Using Robust Watermarking And A Steganography Approach
369(1)
13.2.1.2 Effect Of Steganography On The Water-Marked Image
370(1)
13.2.2 Combination Of A Fragile Watermarking And Steganography Approach
370(3)
13.2.2.1 Steps To Make A Hybrid Approach Using Fragile Watermarking And A Steganography Approach
372(1)
13.2.3 Valid Sequence For Steganography And Watermarking
373(1)
13.3 Hybrid Approach Using Visual Cryptography And Watermarking
374(7)
13.3.1 Combination Of VC With Halftone Shares And A Watermarking Approach
374(2)
13.3.1.1 Protection Of Halftone Shares Using Fragile Watermarks
375(1)
13.3.1.2 Effect Of A Fragile Watermark On Shares
375(1)
13.3.2 Combination Of VC With Multitone Shares And Watermarking Approach
376(6)
13.3.2.1 Protection Of A Multitone Shares With A Robust Watermarking Approach
376(2)
13.3.2.2 Protection Of Multitone Shares With A Fragile Watermarking Approach
378(3)
13.4 Hybrid Approach Using Visual Cryptography And Steganography
381(1)
13.5 Hybrid Approach Using Visual Cryptography, Watermarking And Steganography
382(5)
13.5.1 Combination Of Halftone VC With Fragile Watermarks And Steganography
382(2)
13.5.1.1 Steps To Embed A Fragile Watermark And Steganography Into The Halftone Share
382(2)
13.5.2 Combination Of Multitone VC With Fragile Watermarks, Robust Watermarks And Steganography
384(3)
Chapter 14 Protection Of Multimedia Objects Using Image-Based Security Methods
387(20)
14.1 Introduction
388(2)
14.2 Audio/Speech Watermarking And Steganography
390(6)
14.2.1 Selection Of The Watermark Format
390(1)
14.2.2 Audio Robust Watermarking
390(4)
14.2.2.1 Steps To Embed Robust Audio Water-Marks Or Steganographic Messages
393(1)
14.2.3 Audio Fragile Watermarking
394(2)
14.2.3.1 Steps For Embedding A Fragile Water-Marks Or Steganography Messages
394(2)
14.3 Audio/Speech Secret Sharing
396(1)
14.3.1 Steps To Create Shares Of The Speech Signal
396(1)
14.4 Video Watermarking, Steganography And Secret Sharing
397(4)
14.4.1 Basic Terminology For Video
397(2)
14.4.2 Process For Video Steganography/Watermarking
399(1)
14.4.3 Enhancing The Security Of Video Watermarking/Steganography
399(2)
14.5 3D Watermarking
401(2)
14.5.1 Introduction
401(2)
14.5.2 Embedding Domain In 3D Models
403(1)
14.5.2.1 Geometric Features
403(1)
14.5.2.2 Topological Features
403(1)
14.6 3D Steganography And Secret Sharing
403(1)
14.7 Biometrics And Telemedicine
404(3)
Index 407
Dr. Shivendra Shivani has received the M.Tech degree, in specialization of Information Security(Digital Image Watermarking) in 2011. He then completed his Doctorate in the specialization of Visual Cryptography from National Institute of Technology Allahabad, India. Currently he is working as an Assistant Professor in the department of computer science and engineering of Thapar Institute of Engineering and Technology ( informally Thapar University), Patiala, India. His current research interest includes Digital image watermarking, Visual Cryptography, Steganography, Multimedia processing & security, Gaming and Animation. Dr. Shivani has published various research articles in many reputed international journals and conferences in the field of his research interest. He has also taken expert talk in the same field many times. He is a member of various professional bodies including Cryptology Research Society of India(CRSI), IEEE etc.

Dr. Suneeta Agarwal received B.Sc. degree in 1973 from University of Allahabad, M.Sc. degree in 1975 from University of Allahabad, Ph.D. in 1980 from Indian Institute of Technology Kanpur. She is having more than 40 years of Teaching Experience and currently Professor in the Computer Science and Engineering Department, National Institute of Technology Allahabad, India. Her current research interest includes Visual Cryptography, 2D and 3D image Watermarking, Steganography, Face Recognition etc. She has guided more than 10 Ph.Ds and more than 100 M.techs in the same area of security. She has more than 200 research articles in the field of image security in various reputed international journals and conferences. She has also edited many book chapters.

Dr. Jasjit S. Suri, PhD, MBA, Fellow AIMBE is an innovator, visionary, scientist, and an internationally known world leader. Dr. Jasjit S. Suri received the Director Generals Gold medal in 1980 and the Fellow of American Institute of Medical and Biological Engineering, awarded by National Academy of Sciences, Washington DC in 2004. He has published over 550 peer reviewed articles and book chapters with H-index (~40), and over 100 innovations/trademarks. He is currently Chairman of Global Biomedical Technologies, Inc., Roseville, CA, USA and in the board of AtheroPoint, Roseville, CA, USA, company dedicated to Atherosclerosis Imaging for early screening for stroke and cardiovascular monitoring. He has held positions as a chairman of IEEE Denver section and advisor board member to healthcare industries and several schools in USA and abroad.